This message was deleted.
# general
a
This message was deleted.
c
check for mutating webhooks
g
hmm, checked there - thanks for the idea though. Am I destined to grepping the output of a for loop grabbing all api-versions and looking for something that has the same formula as mutatingwebhooks?
Eg UPDATE CREATE verbiage
c
I’m assuming you’ve checked for a LimitRange in the namespace already? https://kubernetes.io/docs/concepts/policy/limit-range/
A LimitRange provides constraints that can:
• Set default request/limit for compute resources in a namespace and automatically inject them to Containers at runtime.
g
I haven't actually, let me try that too. That was it
yay! thanks!
So I found the limitranges, deleted them but they re-appeared. I then looked at why, apparently re-created by norman, whoever/whatever that is, turned up a search result: https://forums.rancher.com/t/norman-keeps-adding-limitranges/37694
c
yeah, so those would be defined in the rancher project that the namespaces are a part of
check the project quota settings I think?
g
hmm, I was able to blank out the values in the edit project section
which in turn caused the values being applied at the pod to cpu 0 for both limits and requests
sigh
whew, ok that was a head scratcher for a bit.
apparently the policy just needs blank fields for it to be unenforced, 0 is not empty here.